@aztec/cli 3.0.0-devnet.2 → 3.0.0-devnet.20251212

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (149) hide show
  1. package/README.md +1 -1
  2. package/dest/cmds/aztec_node/block_number.d.ts +1 -1
  3. package/dest/cmds/aztec_node/get_block.d.ts +1 -1
  4. package/dest/cmds/aztec_node/get_block.d.ts.map +1 -1
  5. package/dest/cmds/aztec_node/get_block.js +2 -1
  6. package/dest/cmds/aztec_node/get_current_base_fee.d.ts +1 -1
  7. package/dest/cmds/aztec_node/get_l1_to_l2_message_witness.d.ts +1 -1
  8. package/dest/cmds/aztec_node/get_logs.d.ts +3 -2
  9. package/dest/cmds/aztec_node/get_logs.d.ts.map +1 -1
  10. package/dest/cmds/aztec_node/get_node_info.d.ts +1 -1
  11. package/dest/cmds/aztec_node/index.d.ts +1 -1
  12. package/dest/cmds/contracts/index.d.ts +1 -1
  13. package/dest/cmds/contracts/inspect_contract.d.ts +1 -1
  14. package/dest/cmds/contracts/inspect_contract.d.ts.map +1 -1
  15. package/dest/cmds/contracts/inspect_contract.js +4 -10
  16. package/dest/cmds/contracts/parse_parameter_struct.d.ts +1 -1
  17. package/dest/cmds/infrastructure/index.d.ts +1 -1
  18. package/dest/cmds/infrastructure/index.d.ts.map +1 -1
  19. package/dest/cmds/infrastructure/index.js +0 -1
  20. package/dest/cmds/infrastructure/sequencers.d.ts +1 -2
  21. package/dest/cmds/infrastructure/sequencers.d.ts.map +1 -1
  22. package/dest/cmds/infrastructure/sequencers.js +3 -1
  23. package/dest/cmds/infrastructure/setup_l2_contract.d.ts +1 -1
  24. package/dest/cmds/l1/advance_epoch.d.ts +1 -1
  25. package/dest/cmds/l1/assume_proven_through.d.ts +1 -1
  26. package/dest/cmds/l1/assume_proven_through.d.ts.map +1 -1
  27. package/dest/cmds/l1/assume_proven_through.js +2 -1
  28. package/dest/cmds/l1/bridge_erc20.d.ts +1 -1
  29. package/dest/cmds/l1/bridge_erc20.d.ts.map +1 -1
  30. package/dest/cmds/l1/bridge_erc20.js +2 -1
  31. package/dest/cmds/l1/create_l1_account.d.ts +1 -1
  32. package/dest/cmds/l1/deploy_l1_contracts.d.ts +1 -1
  33. package/dest/cmds/l1/deploy_l1_contracts.js +1 -1
  34. package/dest/cmds/l1/deploy_new_rollup.d.ts +2 -2
  35. package/dest/cmds/l1/deploy_new_rollup.d.ts.map +1 -1
  36. package/dest/cmds/l1/deploy_new_rollup.js +1 -1
  37. package/dest/cmds/l1/get_l1_addresses.d.ts +1 -1
  38. package/dest/cmds/l1/get_l1_addresses.d.ts.map +1 -1
  39. package/dest/cmds/l1/get_l1_addresses.js +2 -1
  40. package/dest/cmds/l1/get_l1_balance.d.ts +1 -1
  41. package/dest/cmds/l1/get_l1_balance.js +1 -1
  42. package/dest/cmds/l1/governance_utils.d.ts +5 -5
  43. package/dest/cmds/l1/governance_utils.d.ts.map +1 -1
  44. package/dest/cmds/l1/governance_utils.js +3 -1
  45. package/dest/cmds/l1/index.d.ts +1 -1
  46. package/dest/cmds/l1/prover_stats.d.ts +1 -1
  47. package/dest/cmds/l1/prover_stats.d.ts.map +1 -1
  48. package/dest/cmds/l1/prover_stats.js +29 -29
  49. package/dest/cmds/l1/trigger_seed_snapshot.d.ts +2 -2
  50. package/dest/cmds/l1/trigger_seed_snapshot.d.ts.map +1 -1
  51. package/dest/cmds/l1/trigger_seed_snapshot.js +2 -1
  52. package/dest/cmds/l1/update_l1_validators.d.ts +6 -6
  53. package/dest/cmds/l1/update_l1_validators.d.ts.map +1 -1
  54. package/dest/cmds/l1/update_l1_validators.js +7 -3
  55. package/dest/cmds/misc/compute_selector.d.ts +1 -1
  56. package/dest/cmds/misc/example_contracts.d.ts +1 -1
  57. package/dest/cmds/misc/generate_bootnode_enr.d.ts +1 -1
  58. package/dest/cmds/misc/generate_p2p_private_key.d.ts +1 -1
  59. package/dest/cmds/misc/generate_secret_and_hash.d.ts +1 -1
  60. package/dest/cmds/misc/generate_secret_and_hash.js +1 -1
  61. package/dest/cmds/misc/generate_secret_key.d.ts +1 -1
  62. package/dest/cmds/misc/get_canonical_sponsored_fpc_address.d.ts +1 -1
  63. package/dest/cmds/misc/index.d.ts +1 -1
  64. package/dest/cmds/misc/update/common.d.ts +1 -1
  65. package/dest/cmds/misc/update/github.d.ts +1 -1
  66. package/dest/cmds/misc/update/noir.d.ts +1 -1
  67. package/dest/cmds/misc/update/npm.d.ts +1 -1
  68. package/dest/cmds/misc/update/npm.js +1 -1
  69. package/dest/cmds/misc/update/utils.d.ts +1 -1
  70. package/dest/cmds/misc/update.d.ts +1 -1
  71. package/dest/cmds/validator_keys/add.d.ts +5 -0
  72. package/dest/cmds/validator_keys/add.d.ts.map +1 -0
  73. package/dest/cmds/validator_keys/add.js +83 -0
  74. package/dest/cmds/validator_keys/generate_bls_keypair.d.ts +12 -0
  75. package/dest/cmds/validator_keys/generate_bls_keypair.d.ts.map +1 -0
  76. package/dest/cmds/validator_keys/generate_bls_keypair.js +27 -0
  77. package/dest/cmds/validator_keys/index.d.ts +4 -0
  78. package/dest/cmds/validator_keys/index.d.ts.map +1 -0
  79. package/dest/cmds/validator_keys/index.js +32 -0
  80. package/dest/cmds/validator_keys/new.d.ts +29 -0
  81. package/dest/cmds/validator_keys/new.d.ts.map +1 -0
  82. package/dest/cmds/validator_keys/new.js +132 -0
  83. package/dest/cmds/validator_keys/shared.d.ts +68 -0
  84. package/dest/cmds/validator_keys/shared.d.ts.map +1 -0
  85. package/dest/cmds/validator_keys/shared.js +274 -0
  86. package/dest/cmds/validator_keys/staker.d.ts +38 -0
  87. package/dest/cmds/validator_keys/staker.d.ts.map +1 -0
  88. package/dest/cmds/validator_keys/staker.js +208 -0
  89. package/dest/cmds/validator_keys/utils.d.ts +25 -0
  90. package/dest/cmds/validator_keys/utils.d.ts.map +1 -0
  91. package/dest/cmds/validator_keys/utils.js +52 -0
  92. package/dest/config/cached_fetch.d.ts +1 -1
  93. package/dest/config/chain_l2_config.d.ts +14 -10
  94. package/dest/config/chain_l2_config.d.ts.map +1 -1
  95. package/dest/config/chain_l2_config.js +128 -67
  96. package/dest/config/enrich_env.d.ts +1 -1
  97. package/dest/config/get_l1_config.d.ts +3 -2
  98. package/dest/config/get_l1_config.d.ts.map +1 -1
  99. package/dest/config/get_l1_config.js +3 -1
  100. package/dest/config/index.d.ts +1 -1
  101. package/dest/config/network_config.d.ts +6 -3
  102. package/dest/config/network_config.d.ts.map +1 -1
  103. package/dest/config/network_config.js +58 -28
  104. package/dest/utils/aztec.d.ts +5 -3
  105. package/dest/utils/aztec.d.ts.map +1 -1
  106. package/dest/utils/aztec.js +6 -3
  107. package/dest/utils/commands.d.ts +12 -3
  108. package/dest/utils/commands.d.ts.map +1 -1
  109. package/dest/utils/commands.js +30 -3
  110. package/dest/utils/encoding.d.ts +1 -1
  111. package/dest/utils/encoding.js +1 -1
  112. package/dest/utils/github.d.ts +1 -1
  113. package/dest/utils/index.d.ts +1 -1
  114. package/dest/utils/inspect.d.ts +3 -2
  115. package/dest/utils/inspect.d.ts.map +1 -1
  116. package/dest/utils/setup_contracts.d.ts +1 -1
  117. package/package.json +37 -28
  118. package/public_include_metric_prefixes.json +1 -0
  119. package/src/cmds/aztec_node/get_block.ts +2 -1
  120. package/src/cmds/aztec_node/get_logs.ts +3 -2
  121. package/src/cmds/contracts/inspect_contract.ts +4 -11
  122. package/src/cmds/infrastructure/index.ts +0 -1
  123. package/src/cmds/infrastructure/sequencers.ts +3 -2
  124. package/src/cmds/l1/assume_proven_through.ts +4 -1
  125. package/src/cmds/l1/bridge_erc20.ts +2 -1
  126. package/src/cmds/l1/deploy_l1_contracts.ts +1 -1
  127. package/src/cmds/l1/deploy_new_rollup.ts +2 -1
  128. package/src/cmds/l1/get_l1_addresses.ts +3 -1
  129. package/src/cmds/l1/get_l1_balance.ts +1 -1
  130. package/src/cmds/l1/governance_utils.ts +3 -8
  131. package/src/cmds/l1/prover_stats.ts +38 -30
  132. package/src/cmds/l1/trigger_seed_snapshot.ts +2 -1
  133. package/src/cmds/l1/update_l1_validators.ts +7 -12
  134. package/src/cmds/misc/generate_secret_and_hash.ts +1 -1
  135. package/src/cmds/misc/update/npm.ts +1 -1
  136. package/src/cmds/validator_keys/add.ts +123 -0
  137. package/src/cmds/validator_keys/generate_bls_keypair.ts +34 -0
  138. package/src/cmds/validator_keys/index.ts +142 -0
  139. package/src/cmds/validator_keys/new.ts +207 -0
  140. package/src/cmds/validator_keys/shared.ts +326 -0
  141. package/src/cmds/validator_keys/staker.ts +301 -0
  142. package/src/cmds/validator_keys/utils.ts +80 -0
  143. package/src/config/chain_l2_config.ts +176 -92
  144. package/src/config/get_l1_config.ts +4 -1
  145. package/src/config/network_config.ts +67 -29
  146. package/src/utils/aztec.ts +9 -9
  147. package/src/utils/commands.ts +41 -3
  148. package/src/utils/encoding.ts +1 -1
  149. package/src/utils/inspect.ts +2 -1
@@ -0,0 +1,68 @@
1
+ import type { EthAddress } from '@aztec/foundation/eth-address';
2
+ import type { LogFn } from '@aztec/foundation/log';
3
+ import type { EthAccount, EthPrivateKey, ValidatorKeyStore } from '@aztec/node-keystore/types';
4
+ import type { AztecAddress } from '@aztec/stdlib/aztec-address';
5
+ export type ValidatorSummary = {
6
+ attesterEth?: string;
7
+ attesterBls?: string;
8
+ publisherEth?: string[];
9
+ };
10
+ export type BuildValidatorsInput = {
11
+ validatorCount: number;
12
+ publisherCount?: number;
13
+ publishers?: string[];
14
+ accountIndex: number;
15
+ baseAddressIndex: number;
16
+ mnemonic: string;
17
+ ikm?: string;
18
+ blsPath?: string;
19
+ feeRecipient: AztecAddress;
20
+ coinbase?: EthAddress;
21
+ remoteSigner?: string;
22
+ };
23
+ export declare function withValidatorIndex(path: string, accountIndex?: number, addressIndex?: number): string;
24
+ /**
25
+ * Compute a compressed BN254 G1 public key from a private key.
26
+ * @param privateKeyHex - Private key as 0x-prefixed hex string
27
+ * @returns Compressed G1 point (32 bytes with sign bit in MSB)
28
+ */
29
+ export declare function computeBlsPublicKeyCompressed(privateKeyHex: string): Promise<string>;
30
+ export declare function deriveEthAttester(mnemonic: string, baseAccountIndex: number, addressIndex: number, remoteSigner?: string): EthAccount | EthPrivateKey;
31
+ export declare function buildValidatorEntries(input: BuildValidatorsInput): Promise<{
32
+ validators: ValidatorKeyStore[];
33
+ summaries: ValidatorSummary[];
34
+ }>;
35
+ export declare function resolveKeystoreOutputPath(dataDir?: string, file?: string): Promise<{
36
+ resolvedDir: string;
37
+ outputPath: string;
38
+ }>;
39
+ export declare function writeKeystoreFile(path: string, keystore: unknown): Promise<void>;
40
+ export declare function logValidatorSummaries(log: LogFn, summaries: ValidatorSummary[]): void;
41
+ export declare function maybePrintJson(log: LogFn, jsonFlag: boolean | undefined, obj: unknown): void;
42
+ /**
43
+ * Writes a BN254 keystore file for a BN254 BLS private key.
44
+ * Returns the absolute path to the written file.
45
+ *
46
+ * @param outDir - Directory to write the keystore file to
47
+ * @param fileNameBase - Base name for the keystore file (will be sanitized)
48
+ * @param password - Password for encrypting the private key
49
+ * @param privateKeyHex - Private key as 0x-prefixed hex string (32 bytes)
50
+ * @param pubkeyHex - Public key as hex string
51
+ * @param derivationPath - BIP-44 style derivation path
52
+ * @returns Absolute path to the written keystore file
53
+ */
54
+ export declare function writeBn254BlsKeystore(outDir: string, fileNameBase: string, password: string, privateKeyHex: string, pubkeyHex: string, derivationPath: string): Promise<string>;
55
+ /** Replace plaintext BLS keys in validators with { path, password } pointing to BN254 keystore files. */
56
+ export declare function writeBlsBn254ToFile(validators: ValidatorKeyStore[], options: {
57
+ outDir: string;
58
+ password: string;
59
+ blsPath?: string;
60
+ }): Promise<void>;
61
+ /** Writes an Ethereum JSON V3 keystore using ethers, returns absolute path */
62
+ export declare function writeEthJsonV3Keystore(outDir: string, fileNameBase: string, password: string, privateKeyHex: string): Promise<string>;
63
+ /** Replace plaintext ETH keys in validators with { path, password } pointing to JSON V3 files. */
64
+ export declare function writeEthJsonV3ToFile(validators: ValidatorKeyStore[], options: {
65
+ outDir: string;
66
+ password: string;
67
+ }): Promise<void>;
68
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoic2hhcmVkLmQudHMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvY21kcy92YWxpZGF0b3Jfa2V5cy9zaGFyZWQudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBSUEsT0FBTyxLQUFLLEVBQUUsVUFBVSxFQUFFLE1BQU0sK0JBQStCLENBQUM7QUFDaEUsT0FBTyxLQUFLLEVBQUUsS0FBSyxFQUFFLE1BQU0sdUJBQXVCLENBQUM7QUFDbkQsT0FBTyxLQUFLLEVBQUUsVUFBVSxFQUFFLGFBQWEsRUFBRSxpQkFBaUIsRUFBRSxNQUFNLDRCQUE0QixDQUFDO0FBQy9GLE9BQU8sS0FBSyxFQUFFLFlBQVksRUFBRSxNQUFNLDZCQUE2QixDQUFDO0FBV2hFLE1BQU0sTUFBTSxnQkFBZ0IsR0FBRztJQUFFLFdBQVcsQ0FBQyxFQUFFLE1BQU0sQ0FBQztJQUFDLFdBQVcsQ0FBQyxFQUFFLE1BQU0sQ0FBQztJQUFDLFlBQVksQ0FBQyxFQUFFLE1BQU0sRUFBRSxDQUFBO0NBQUUsQ0FBQztBQUV2RyxNQUFNLE1BQU0sb0JBQW9CLEdBQUc7SUFDakMsY0FBYyxFQUFFLE1BQU0sQ0FBQztJQUN2QixjQUFjLENBQUMsRUFBRSxNQUFNLENBQUM7SUFDeEIsVUFBVSxDQUFDLEVBQUUsTUFBTSxFQUFFLENBQUM7SUFDdEIsWUFBWSxFQUFFLE1BQU0sQ0FBQztJQUNyQixnQkFBZ0IsRUFBRSxNQUFNLENBQUM7SUFDekIsUUFBUSxFQUFFLE1BQU0sQ0FBQztJQUNqQixHQUFHLENBQUMsRUFBRSxNQUFNLENBQUM7SUFDYixPQUFPLENBQUMsRUFBRSxNQUFNLENBQUM7SUFDakIsWUFBWSxFQUFFLFlBQVksQ0FBQztJQUMzQixRQUFRLENBQUMsRUFBRSxVQUFVLENBQUM7SUFDdEIsWUFBWSxDQUFDLEVBQUUsTUFBTSxDQUFDO0NBQ3ZCLENBQUM7QUFFRix3QkFBZ0Isa0JBQWtCLENBQUMsSUFBSSxFQUFFLE1BQU0sRUFBRSxZQUFZLEdBQUUsTUFBVSxFQUFFLFlBQVksR0FBRSxNQUFVLFVBcUJsRztBQUVEOzs7O0dBSUc7QUFDSCx3QkFBc0IsNkJBQTZCLENBQUMsYUFBYSxFQUFFLE1BQU0sR0FBRyxPQUFPLENBQUMsTUFBTSxDQUFDLENBRTFGO0FBRUQsd0JBQWdCLGlCQUFpQixDQUMvQixRQUFRLEVBQUUsTUFBTSxFQUNoQixnQkFBZ0IsRUFBRSxNQUFNLEVBQ3hCLFlBQVksRUFBRSxNQUFNLEVBQ3BCLFlBQVksQ0FBQyxFQUFFLE1BQU0sR0FDcEIsVUFBVSxHQUFHLGFBQWEsQ0FLNUI7QUFFRCx3QkFBc0IscUJBQXFCLENBQUMsS0FBSyxFQUFFLG9CQUFvQjs7O0dBdUV0RTtBQUVELHdCQUFzQix5QkFBeUIsQ0FBQyxPQUFPLENBQUMsRUFBRSxNQUFNLEVBQUUsSUFBSSxDQUFDLEVBQUUsTUFBTTs7O0dBb0I5RTtBQUVELHdCQUFzQixpQkFBaUIsQ0FBQyxJQUFJLEVBQUUsTUFBTSxFQUFFLFFBQVEsRUFBRSxPQUFPLGlCQUd0RTtBQUVELHdCQUFnQixxQkFBcUIsQ0FBQyxHQUFHLEVBQUUsS0FBSyxFQUFFLFNBQVMsRUFBRSxnQkFBZ0IsRUFBRSxRQXNCOUU7QUFFRCx3QkFBZ0IsY0FBYyxDQUFDLEdBQUcsRUFBRSxLQUFLLEVBQUUsUUFBUSxFQUFFLE9BQU8sR0FBRyxTQUFTLEVBQUUsR0FBRyxFQUFFLE9BQU8sUUFJckY7QUFFRDs7Ozs7Ozs7Ozs7R0FXRztBQUNILHdCQUFzQixxQkFBcUIsQ0FDekMsTUFBTSxFQUFFLE1BQU0sRUFDZCxZQUFZLEVBQUUsTUFBTSxFQUNwQixRQUFRLEVBQUUsTUFBTSxFQUNoQixhQUFhLEVBQUUsTUFBTSxFQUNyQixTQUFTLEVBQUUsTUFBTSxFQUNqQixjQUFjLEVBQUUsTUFBTSxHQUNyQixPQUFPLENBQUMsTUFBTSxDQUFDLENBU2pCO0FBRUQseUdBQXlHO0FBQ3pHLHdCQUFzQixtQkFBbUIsQ0FDdkMsVUFBVSxFQUFFLGlCQUFpQixFQUFFLEVBQy9CLE9BQU8sRUFBRTtJQUFFLE1BQU0sRUFBRSxNQUFNLENBQUM7SUFBQyxRQUFRLEVBQUUsTUFBTSxDQUFDO0lBQUMsT0FBTyxDQUFDLEVBQUUsTUFBTSxDQUFBO0NBQUUsR0FDOUQsT0FBTyxDQUFDLElBQUksQ0FBQyxDQXVCZjtBQUVELDhFQUE4RTtBQUM5RSx3QkFBc0Isc0JBQXNCLENBQzFDLE1BQU0sRUFBRSxNQUFNLEVBQ2QsWUFBWSxFQUFFLE1BQU0sRUFDcEIsUUFBUSxFQUFFLE1BQU0sRUFDaEIsYUFBYSxFQUFFLE1BQU0sR0FDcEIsT0FBTyxDQUFDLE1BQU0sQ0FBQyxDQVFqQjtBQUVELGtHQUFrRztBQUNsRyx3QkFBc0Isb0JBQW9CLENBQ3hDLFVBQVUsRUFBRSxpQkFBaUIsRUFBRSxFQUMvQixPQUFPLEVBQUU7SUFBRSxNQUFNLEVBQUUsTUFBTSxDQUFDO0lBQUMsUUFBUSxFQUFFLE1BQU0sQ0FBQTtDQUFFLEdBQzVDLE9BQU8sQ0FBQyxJQUFJLENBQUMsQ0FzQ2YifQ==
@@ -0,0 +1 @@
1
+ {"version":3,"file":"shared.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/shared.ts"],"names":[],"mappings":"AAIA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,KAAK,EAAE,UAAU,EAAE,aAAa,EAAE,iBAAiB,EAAE,MAAM,4BAA4B,CAAC;AAC/F,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAWhE,MAAM,MAAM,gBAAgB,GAAG;IAAE,WAAW,CAAC,EAAE,MAAM,CAAC;IAAC,WAAW,CAAC,EAAE,MAAM,CAAC;IAAC,YAAY,CAAC,EAAE,MAAM,EAAE,CAAA;CAAE,CAAC;AAEvG,MAAM,MAAM,oBAAoB,GAAG;IACjC,cAAc,EAAE,MAAM,CAAC;IACvB,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;IACtB,YAAY,EAAE,MAAM,CAAC;IACrB,gBAAgB,EAAE,MAAM,CAAC;IACzB,QAAQ,EAAE,MAAM,CAAC;IACjB,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,YAAY,EAAE,YAAY,CAAC;IAC3B,QAAQ,CAAC,EAAE,UAAU,CAAC;IACtB,YAAY,CAAC,EAAE,MAAM,CAAC;CACvB,CAAC;AAEF,wBAAgB,kBAAkB,CAAC,IAAI,EAAE,MAAM,EAAE,YAAY,GAAE,MAAU,EAAE,YAAY,GAAE,MAAU,UAqBlG;AAED;;;;GAIG;AACH,wBAAsB,6BAA6B,CAAC,aAAa,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAE1F;AAED,wBAAgB,iBAAiB,CAC/B,QAAQ,EAAE,MAAM,EAChB,gBAAgB,EAAE,MAAM,EACxB,YAAY,EAAE,MAAM,EACpB,YAAY,CAAC,EAAE,MAAM,GACpB,UAAU,GAAG,aAAa,CAK5B;AAED,wBAAsB,qBAAqB,CAAC,KAAK,EAAE,oBAAoB;;;GAuEtE;AAED,wBAAsB,yBAAyB,CAAC,OAAO,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,EAAE,MAAM;;;GAoB9E;AAED,wBAAsB,iBAAiB,CAAC,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,OAAO,iBAGtE;AAED,wBAAgB,qBAAqB,CAAC,GAAG,EAAE,KAAK,EAAE,SAAS,EAAE,gBAAgB,EAAE,QAsB9E;AAED,wBAAgB,cAAc,CAAC,GAAG,EAAE,KAAK,EAAE,QAAQ,EAAE,OAAO,GAAG,SAAS,EAAE,GAAG,EAAE,OAAO,QAIrF;AAED;;;;;;;;;;;GAWG;AACH,wBAAsB,qBAAqB,CACzC,MAAM,EAAE,MAAM,EACd,YAAY,EAAE,MAAM,EACpB,QAAQ,EAAE,MAAM,EAChB,aAAa,EAAE,MAAM,EACrB,SAAS,EAAE,MAAM,EACjB,cAAc,EAAE,MAAM,GACrB,OAAO,CAAC,MAAM,CAAC,CASjB;AAED,yGAAyG;AACzG,wBAAsB,mBAAmB,CACvC,UAAU,EAAE,iBAAiB,EAAE,EAC/B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,CAAC;IAAC,QAAQ,EAAE,MAAM,CAAC;IAAC,OAAO,CAAC,EAAE,MAAM,CAAA;CAAE,GAC9D,OAAO,CAAC,IAAI,CAAC,CAuBf;AAED,8EAA8E;AAC9E,wBAAsB,sBAAsB,CAC1C,MAAM,EAAE,MAAM,EACd,YAAY,EAAE,MAAM,EACpB,QAAQ,EAAE,MAAM,EAChB,aAAa,EAAE,MAAM,GACpB,OAAO,CAAC,MAAM,CAAC,CAQjB;AAED,kGAAkG;AAClG,wBAAsB,oBAAoB,CACxC,UAAU,EAAE,iBAAiB,EAAE,EAC/B,OAAO,EAAE;IAAE,MAAM,EAAE,MAAM,CAAC;IAAC,QAAQ,EAAE,MAAM,CAAA;CAAE,GAC5C,OAAO,CAAC,IAAI,CAAC,CAsCf"}
@@ -0,0 +1,274 @@
1
+ import { prettyPrintJSON } from '@aztec/cli/utils';
2
+ import { deriveBlsPrivateKey } from '@aztec/foundation/crypto/bls';
3
+ import { createBn254Keystore } from '@aztec/foundation/crypto/bls/bn254_keystore';
4
+ import { computeBn254G1PublicKeyCompressed } from '@aztec/foundation/crypto/bn254';
5
+ import { Wallet } from '@ethersproject/wallet';
6
+ import { constants as fsConstants, mkdirSync } from 'fs';
7
+ import { access, writeFile } from 'fs/promises';
8
+ import { homedir } from 'os';
9
+ import { dirname, isAbsolute, join } from 'path';
10
+ import { mnemonicToAccount } from 'viem/accounts';
11
+ import { defaultBlsPath } from './utils.js';
12
+ export function withValidatorIndex(path, accountIndex = 0, addressIndex = 0) {
13
+ // NOTE: The legacy BLS CLI is to allow users who generated keys in 2.1.4 to be able to use the same command
14
+ // to re-generate their keys. In 2.1.5 we switched how we append addresses to the path so this is to maintain backwards compatibility.
15
+ const useLegacyBlsCli = [
16
+ 'true',
17
+ '1',
18
+ 'yes',
19
+ 'y'
20
+ ].includes(process.env.LEGACY_BLS_CLI ?? '');
21
+ const defaultBlsPathParts = defaultBlsPath.split('/');
22
+ const parts = path.split('/');
23
+ if (parts.length == defaultBlsPathParts.length && parts.every((part, index)=>part === defaultBlsPathParts[index])) {
24
+ if (useLegacyBlsCli) {
25
+ // In 2.1.4, we were using address-index in parts[3] and did NOT use account-index, check lines 32 & 84
26
+ // https://github.com/AztecProtocol/aztec-packages/blob/v2.1.4/yarn-project/cli/src/cmds/validator_keys/shared.ts
27
+ parts[3] = String(addressIndex);
28
+ } else {
29
+ parts[3] = String(accountIndex);
30
+ parts[5] = String(addressIndex);
31
+ }
32
+ return parts.join('/');
33
+ }
34
+ return path;
35
+ }
36
+ /**
37
+ * Compute a compressed BN254 G1 public key from a private key.
38
+ * @param privateKeyHex - Private key as 0x-prefixed hex string
39
+ * @returns Compressed G1 point (32 bytes with sign bit in MSB)
40
+ */ export async function computeBlsPublicKeyCompressed(privateKeyHex) {
41
+ return await computeBn254G1PublicKeyCompressed(privateKeyHex);
42
+ }
43
+ export function deriveEthAttester(mnemonic, baseAccountIndex, addressIndex, remoteSigner) {
44
+ const acct = mnemonicToAccount(mnemonic, {
45
+ accountIndex: baseAccountIndex,
46
+ addressIndex
47
+ });
48
+ return remoteSigner ? {
49
+ address: acct.address,
50
+ remoteSignerUrl: remoteSigner
51
+ } : '0x' + Buffer.from(acct.getHdKey().privateKey).toString('hex');
52
+ }
53
+ export async function buildValidatorEntries(input) {
54
+ const { validatorCount, publisherCount = 0, publishers, accountIndex, baseAddressIndex, mnemonic, ikm, blsPath, feeRecipient, coinbase, remoteSigner } = input;
55
+ const summaries = [];
56
+ const validators = await Promise.all(Array.from({
57
+ length: validatorCount
58
+ }, async (_unused, i)=>{
59
+ const addressIndex = baseAddressIndex + i;
60
+ const basePath = blsPath ?? defaultBlsPath;
61
+ const perValidatorPath = withValidatorIndex(basePath, accountIndex, addressIndex);
62
+ const blsPrivKey = ikm || mnemonic ? deriveBlsPrivateKey(mnemonic, ikm, perValidatorPath) : undefined;
63
+ const blsPubCompressed = blsPrivKey ? await computeBlsPublicKeyCompressed(blsPrivKey) : undefined;
64
+ const ethAttester = deriveEthAttester(mnemonic, accountIndex, addressIndex, remoteSigner);
65
+ const attester = blsPrivKey ? {
66
+ eth: ethAttester,
67
+ bls: blsPrivKey
68
+ } : ethAttester;
69
+ let publisherField;
70
+ const publisherAddresses = [];
71
+ if (publishers && publishers.length > 0) {
72
+ publisherAddresses.push(...publishers);
73
+ publisherField = publishers.length === 1 ? publishers[0] : publishers;
74
+ } else if (publisherCount > 0) {
75
+ const publishersBaseIndex = baseAddressIndex + validatorCount + i * publisherCount;
76
+ const publisherAccounts = Array.from({
77
+ length: publisherCount
78
+ }, (_unused2, j)=>{
79
+ const publisherAddressIndex = publishersBaseIndex + j;
80
+ const pubAcct = mnemonicToAccount(mnemonic, {
81
+ accountIndex,
82
+ addressIndex: publisherAddressIndex
83
+ });
84
+ publisherAddresses.push(pubAcct.address);
85
+ return remoteSigner ? {
86
+ address: pubAcct.address,
87
+ remoteSignerUrl: remoteSigner
88
+ } : '0x' + Buffer.from(pubAcct.getHdKey().privateKey).toString('hex');
89
+ });
90
+ publisherField = publisherCount === 1 ? publisherAccounts[0] : publisherAccounts;
91
+ }
92
+ const acct = mnemonicToAccount(mnemonic, {
93
+ accountIndex,
94
+ addressIndex
95
+ });
96
+ const attesterEthAddress = acct.address;
97
+ summaries.push({
98
+ attesterEth: attesterEthAddress,
99
+ attesterBls: blsPubCompressed,
100
+ publisherEth: publisherAddresses.length > 0 ? publisherAddresses : undefined
101
+ });
102
+ return {
103
+ attester,
104
+ ...publisherField !== undefined ? {
105
+ publisher: publisherField
106
+ } : {},
107
+ feeRecipient,
108
+ coinbase: coinbase ?? attesterEthAddress
109
+ };
110
+ }));
111
+ return {
112
+ validators,
113
+ summaries
114
+ };
115
+ }
116
+ export async function resolveKeystoreOutputPath(dataDir, file) {
117
+ const defaultDataDir = join(homedir(), '.aztec', 'keystore');
118
+ const resolvedDir = dataDir && dataDir.length > 0 ? dataDir : defaultDataDir;
119
+ let outputPath;
120
+ if (file && file.length > 0) {
121
+ outputPath = isAbsolute(file) ? file : join(resolvedDir, file);
122
+ } else {
123
+ let index = 1;
124
+ while(true){
125
+ const candidate = join(resolvedDir, `key${index}.json`);
126
+ try {
127
+ await access(candidate, fsConstants.F_OK);
128
+ index += 1;
129
+ } catch {
130
+ outputPath = candidate;
131
+ break;
132
+ }
133
+ }
134
+ }
135
+ return {
136
+ resolvedDir,
137
+ outputPath: outputPath
138
+ };
139
+ }
140
+ export async function writeKeystoreFile(path, keystore) {
141
+ mkdirSync(dirname(path), {
142
+ recursive: true
143
+ });
144
+ await writeFile(path, JSON.stringify(keystore, null, 2), {
145
+ encoding: 'utf-8'
146
+ });
147
+ }
148
+ export function logValidatorSummaries(log, summaries) {
149
+ const lines = [];
150
+ for(let i = 0; i < summaries.length; i++){
151
+ const v = summaries[i];
152
+ lines.push(`acc${i + 1}:`);
153
+ lines.push(` attester:`);
154
+ if (v.attesterEth) {
155
+ lines.push(` eth: ${v.attesterEth}`);
156
+ }
157
+ if (v.attesterBls) {
158
+ lines.push(` bls: ${v.attesterBls}`);
159
+ }
160
+ if (v.publisherEth && v.publisherEth.length > 0) {
161
+ lines.push(` publisher:`);
162
+ for (const addr of v.publisherEth){
163
+ lines.push(` - ${addr}`);
164
+ }
165
+ }
166
+ }
167
+ if (lines.length > 0) {
168
+ log(lines.join('\n'));
169
+ }
170
+ }
171
+ export function maybePrintJson(log, jsonFlag, obj) {
172
+ if (jsonFlag) {
173
+ log(prettyPrintJSON(obj));
174
+ }
175
+ }
176
+ /**
177
+ * Writes a BN254 keystore file for a BN254 BLS private key.
178
+ * Returns the absolute path to the written file.
179
+ *
180
+ * @param outDir - Directory to write the keystore file to
181
+ * @param fileNameBase - Base name for the keystore file (will be sanitized)
182
+ * @param password - Password for encrypting the private key
183
+ * @param privateKeyHex - Private key as 0x-prefixed hex string (32 bytes)
184
+ * @param pubkeyHex - Public key as hex string
185
+ * @param derivationPath - BIP-44 style derivation path
186
+ * @returns Absolute path to the written keystore file
187
+ */ export async function writeBn254BlsKeystore(outDir, fileNameBase, password, privateKeyHex, pubkeyHex, derivationPath) {
188
+ mkdirSync(outDir, {
189
+ recursive: true
190
+ });
191
+ const keystore = createBn254Keystore(password, privateKeyHex, pubkeyHex, derivationPath);
192
+ const safeBase = fileNameBase.replace(/[^a-zA-Z0-9_-]/g, '_');
193
+ const outPath = join(outDir, `keystore-${safeBase}.json`);
194
+ await writeFile(outPath, JSON.stringify(keystore, null, 2), {
195
+ encoding: 'utf-8'
196
+ });
197
+ return outPath;
198
+ }
199
+ /** Replace plaintext BLS keys in validators with { path, password } pointing to BN254 keystore files. */ export async function writeBlsBn254ToFile(validators, options) {
200
+ for(let i = 0; i < validators.length; i++){
201
+ const v = validators[i];
202
+ if (!v || typeof v !== 'object' || !('attester' in v)) {
203
+ continue;
204
+ }
205
+ const att = v.attester;
206
+ // Shapes: { bls: <hex> } or { eth: <ethAccount>, bls?: <hex> } or plain EthAccount
207
+ const blsKey = typeof att === 'object' && 'bls' in att ? att.bls : undefined;
208
+ if (!blsKey || typeof blsKey !== 'string') {
209
+ continue;
210
+ }
211
+ const pub = await computeBlsPublicKeyCompressed(blsKey);
212
+ const path = options.blsPath ?? defaultBlsPath;
213
+ const fileBase = `${String(i + 1)}_${pub.slice(2, 18)}`;
214
+ const keystorePath = await writeBn254BlsKeystore(options.outDir, fileBase, options.password, blsKey, pub, path);
215
+ if (typeof att === 'object') {
216
+ att.bls = {
217
+ path: keystorePath,
218
+ password: options.password
219
+ };
220
+ }
221
+ }
222
+ }
223
+ /** Writes an Ethereum JSON V3 keystore using ethers, returns absolute path */ export async function writeEthJsonV3Keystore(outDir, fileNameBase, password, privateKeyHex) {
224
+ const safeBase = fileNameBase.replace(/[^a-zA-Z0-9_-]/g, '_');
225
+ mkdirSync(outDir, {
226
+ recursive: true
227
+ });
228
+ const wallet = new Wallet(privateKeyHex);
229
+ const json = await wallet.encrypt(password);
230
+ const outPath = join(outDir, `keystore-eth-${safeBase}.json`);
231
+ await writeFile(outPath, json, {
232
+ encoding: 'utf-8'
233
+ });
234
+ return outPath;
235
+ }
236
+ /** Replace plaintext ETH keys in validators with { path, password } pointing to JSON V3 files. */ export async function writeEthJsonV3ToFile(validators, options) {
237
+ const maybeEncryptEth = async (account, label)=>{
238
+ if (typeof account === 'string' && account.startsWith('0x') && account.length === 66) {
239
+ const fileBase = `${label}_${account.slice(2, 10)}`;
240
+ const p = await writeEthJsonV3Keystore(options.outDir, fileBase, options.password, account);
241
+ return {
242
+ path: p,
243
+ password: options.password
244
+ };
245
+ }
246
+ return account;
247
+ };
248
+ for(let i = 0; i < validators.length; i++){
249
+ const v = validators[i];
250
+ if (!v || typeof v !== 'object') {
251
+ continue;
252
+ }
253
+ // attester may be string (eth), object with eth, or remote signer
254
+ const att = v.attester;
255
+ if (typeof att === 'string') {
256
+ v.attester = await maybeEncryptEth(att, `attester_${i + 1}`);
257
+ } else if (att && typeof att === 'object' && 'eth' in att) {
258
+ att.eth = await maybeEncryptEth(att.eth, `attester_${i + 1}`);
259
+ }
260
+ // publisher can be single or array
261
+ if ('publisher' in v) {
262
+ const pub = v.publisher;
263
+ if (Array.isArray(pub)) {
264
+ const out = [];
265
+ for(let j = 0; j < pub.length; j++){
266
+ out.push(await maybeEncryptEth(pub[j], `publisher_${i + 1}_${j + 1}`));
267
+ }
268
+ v.publisher = out;
269
+ } else if (pub !== undefined) {
270
+ v.publisher = await maybeEncryptEth(pub, `publisher_${i + 1}`);
271
+ }
272
+ }
273
+ }
274
+ }
@@ -0,0 +1,38 @@
1
+ import { GSEContract } from '@aztec/ethereum/contracts';
2
+ import type { EthAddress } from '@aztec/foundation/eth-address';
3
+ import type { LogFn } from '@aztec/foundation/log';
4
+ import type { AttesterAccounts } from '@aztec/node-keystore/types';
5
+ export type StakerOptions = {
6
+ from: string;
7
+ password?: string;
8
+ output?: string;
9
+ gseAddress: EthAddress;
10
+ l1RpcUrls: string[];
11
+ l1ChainId: number;
12
+ };
13
+ export type StakerOutput = {
14
+ attester: string;
15
+ publicKeyG1: {
16
+ x: string;
17
+ y: string;
18
+ };
19
+ publicKeyG2: {
20
+ x0: string;
21
+ x1: string;
22
+ y0: string;
23
+ y1: string;
24
+ };
25
+ proofOfPossession: {
26
+ x: string;
27
+ y: string;
28
+ };
29
+ };
30
+ /**
31
+ * Process AttesterAccounts (which can be a single attester, array, or mnemonic)
32
+ */
33
+ export declare function processAttesterAccounts(attesterAccounts: AttesterAccounts, gse: GSEContract, password?: string): Promise<StakerOutput[]>;
34
+ /**
35
+ * Main staker command function
36
+ */
37
+ export declare function generateStakerJson(options: StakerOptions, log: LogFn): Promise<void>;
38
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1 @@
1
+ {"version":3,"file":"staker.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/staker.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,WAAW,EAAE,MAAM,2BAA2B,CAAC;AAIxD,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,uBAAuB,CAAC;AAEnD,OAAO,KAAK,EAEV,gBAAgB,EAKjB,MAAM,4BAA4B,CAAC;AAQpC,MAAM,MAAM,aAAa,GAAG;IAC1B,IAAI,EAAE,MAAM,CAAC;IACb,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,UAAU,EAAE,UAAU,CAAC;IACvB,SAAS,EAAE,MAAM,EAAE,CAAC;IACpB,SAAS,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF,MAAM,MAAM,YAAY,GAAG;IACzB,QAAQ,EAAE,MAAM,CAAC;IACjB,WAAW,EAAE;QACX,CAAC,EAAE,MAAM,CAAC;QACV,CAAC,EAAE,MAAM,CAAC;KACX,CAAC;IACF,WAAW,EAAE;QACX,EAAE,EAAE,MAAM,CAAC;QACX,EAAE,EAAE,MAAM,CAAC;QACX,EAAE,EAAE,MAAM,CAAC;QACX,EAAE,EAAE,MAAM,CAAC;KACZ,CAAC;IACF,iBAAiB,EAAE;QACjB,CAAC,EAAE,MAAM,CAAC;QACV,CAAC,EAAE,MAAM,CAAC;KACX,CAAC;CACH,CAAC;AA2KF;;GAEG;AACH,wBAAsB,uBAAuB,CAC3C,gBAAgB,EAAE,gBAAgB,EAClC,GAAG,EAAE,WAAW,EAChB,QAAQ,CAAC,EAAE,MAAM,GAChB,OAAO,CAAC,YAAY,EAAE,CAAC,CAqBzB;AAED;;GAEG;AACH,wBAAsB,kBAAkB,CAAC,OAAO,EAAE,aAAa,EAAE,GAAG,EAAE,KAAK,GAAG,OAAO,CAAC,IAAI,CAAC,CA+C1F"}
@@ -0,0 +1,208 @@
1
+ import { prettyPrintJSON } from '@aztec/cli/utils';
2
+ import { createEthereumChain } from '@aztec/ethereum/chain';
3
+ import { GSEContract } from '@aztec/ethereum/contracts';
4
+ import { decryptBn254Keystore } from '@aztec/foundation/crypto/bls/bn254_keystore';
5
+ import { computeBn254G1PublicKey, computeBn254G2PublicKey } from '@aztec/foundation/crypto/bn254';
6
+ import { Fr } from '@aztec/foundation/curves/bn254';
7
+ import { loadKeystoreFile } from '@aztec/node-keystore/loader';
8
+ import { Wallet } from '@ethersproject/wallet';
9
+ import { readFileSync, writeFileSync } from 'fs';
10
+ import { basename, dirname, join } from 'path';
11
+ import { createPublicClient, fallback, http } from 'viem';
12
+ import { privateKeyToAddress } from 'viem/accounts';
13
+ /**
14
+ * Check if an object is a MnemonicConfig
15
+ */ function isMnemonicConfig(obj) {
16
+ return typeof obj === 'object' && obj !== null && 'mnemonic' in obj;
17
+ }
18
+ /**
19
+ * Check if a value is an encrypted keystore file config
20
+ */ function isEncryptedKeyFileConfig(value) {
21
+ return typeof value === 'object' && value !== null && 'path' in value;
22
+ }
23
+ /**
24
+ * Check if a BLSAccount is a private key string (not an encrypted keystore file)
25
+ */ function isBlsPrivateKey(bls) {
26
+ return typeof bls === 'string' && bls.startsWith('0x');
27
+ }
28
+ /**
29
+ * Check if an EthAccount is a private key string (66 chars: 0x + 64 hex)
30
+ */ function isEthPrivateKey(eth) {
31
+ return typeof eth === 'string' && eth.startsWith('0x') && eth.length === 66;
32
+ }
33
+ /**
34
+ * Check if a string is an Ethereum address (42 chars: 0x + 40 hex)
35
+ */ function isEthAddress(value) {
36
+ return typeof value === 'string' && /^0x[0-9a-fA-F]{40}$/.test(value);
37
+ }
38
+ /**
39
+ * Decrypt a BLS private key from an encrypted keystore file
40
+ */ function decryptBlsKey(bls, password) {
41
+ if (isBlsPrivateKey(bls)) {
42
+ return bls;
43
+ }
44
+ if (isEncryptedKeyFileConfig(bls)) {
45
+ if (!password && !bls.password) {
46
+ return undefined; // Can't decrypt without password
47
+ }
48
+ const pwd = password ?? bls.password;
49
+ return decryptBn254Keystore(bls.path, pwd);
50
+ }
51
+ return undefined;
52
+ }
53
+ /**
54
+ * Decrypt an Ethereum private key from an encrypted keystore file
55
+ */ async function decryptEthKey(eth, password) {
56
+ if (isEthPrivateKey(eth)) {
57
+ return eth;
58
+ }
59
+ if (isEncryptedKeyFileConfig(eth)) {
60
+ if (!password && !eth.password) {
61
+ return undefined; // Can't decrypt without password
62
+ }
63
+ const pwd = password ?? eth.password;
64
+ const json = readFileSync(eth.path, 'utf-8');
65
+ const wallet = await Wallet.fromEncryptedJson(json, pwd);
66
+ return wallet.privateKey;
67
+ }
68
+ return undefined;
69
+ }
70
+ /**
71
+ * Extract Ethereum address from an EthAccount (or private key)
72
+ */ async function getEthAddress(eth, password) {
73
+ // Case 1: It's a private key string - derive the address
74
+ if (isEthPrivateKey(eth)) {
75
+ return privateKeyToAddress(eth);
76
+ }
77
+ // Case 2: It's just an address string directly (EthRemoteSignerAccount can be just EthAddress)
78
+ if (isEthAddress(eth)) {
79
+ return eth;
80
+ }
81
+ // Case 3: It's an object with an address property (remote signer config)
82
+ if (typeof eth === 'object' && eth !== null && 'address' in eth) {
83
+ return eth.address;
84
+ }
85
+ // Case 4: It's an encrypted keystore file - decrypt and derive address
86
+ if (isEncryptedKeyFileConfig(eth)) {
87
+ const privateKey = await decryptEthKey(eth, password);
88
+ if (privateKey) {
89
+ return privateKeyToAddress(privateKey);
90
+ }
91
+ return undefined;
92
+ }
93
+ return undefined;
94
+ }
95
+ /**
96
+ * Extract BLS private key and Ethereum address from an AttesterAccount
97
+ */ async function extractAttesterInfo(attester, password) {
98
+ // Case 1: attester is { eth: EthAccount, bls?: BLSAccount }
99
+ if (typeof attester === 'object' && attester !== null && 'eth' in attester) {
100
+ const ethAddress = await getEthAddress(attester.eth, password);
101
+ const blsPrivateKey = attester.bls ? decryptBlsKey(attester.bls, password) : undefined;
102
+ return {
103
+ blsPrivateKey,
104
+ ethAddress
105
+ };
106
+ }
107
+ // Case 2: attester is just an EthAccount directly (no BLS key)
108
+ return {
109
+ blsPrivateKey: undefined,
110
+ ethAddress: await getEthAddress(attester, password)
111
+ };
112
+ }
113
+ /**
114
+ * Process a single attester entry and output staking JSON
115
+ */ async function processAttester(attester, gse, password) {
116
+ const { blsPrivateKey, ethAddress } = await extractAttesterInfo(attester, password);
117
+ // Skip if no BLS private key or no Ethereum address
118
+ if (!blsPrivateKey || !ethAddress) {
119
+ return undefined;
120
+ }
121
+ // Derive G1 and G2 public keys
122
+ const g1PublicKey = await computeBn254G1PublicKey(blsPrivateKey);
123
+ const g2PublicKey = await computeBn254G2PublicKey(blsPrivateKey);
124
+ // Generate proof of possession
125
+ const bn254SecretKeyFieldElement = Fr.fromString(blsPrivateKey);
126
+ const registrationTuple = await gse.makeRegistrationTuple(bn254SecretKeyFieldElement.toBigInt());
127
+ return {
128
+ attester: String(ethAddress),
129
+ publicKeyG1: {
130
+ x: '0x' + g1PublicKey.x.toString(16).padStart(64, '0'),
131
+ y: '0x' + g1PublicKey.y.toString(16).padStart(64, '0')
132
+ },
133
+ publicKeyG2: {
134
+ x0: '0x' + g2PublicKey.x.c0.toString(16).padStart(64, '0'),
135
+ x1: '0x' + g2PublicKey.x.c1.toString(16).padStart(64, '0'),
136
+ y0: '0x' + g2PublicKey.y.c0.toString(16).padStart(64, '0'),
137
+ y1: '0x' + g2PublicKey.y.c1.toString(16).padStart(64, '0')
138
+ },
139
+ proofOfPossession: {
140
+ x: '0x' + registrationTuple.proofOfPossession.x.toString(16),
141
+ y: '0x' + registrationTuple.proofOfPossession.y.toString(16)
142
+ }
143
+ };
144
+ }
145
+ /**
146
+ * Process AttesterAccounts (which can be a single attester, array, or mnemonic)
147
+ */ export async function processAttesterAccounts(attesterAccounts, gse, password) {
148
+ // Skip mnemonic configs
149
+ if (isMnemonicConfig(attesterAccounts)) {
150
+ return [];
151
+ }
152
+ // Handle array of attesters
153
+ if (Array.isArray(attesterAccounts)) {
154
+ const results = [];
155
+ for (const attester of attesterAccounts){
156
+ const result = await processAttester(attester, gse, password);
157
+ if (result) {
158
+ results.push(result);
159
+ }
160
+ }
161
+ return results;
162
+ }
163
+ // Handle single attester
164
+ const result = await processAttester(attesterAccounts, gse, password);
165
+ return result ? [
166
+ result
167
+ ] : [];
168
+ }
169
+ /**
170
+ * Main staker command function
171
+ */ export async function generateStakerJson(options, log) {
172
+ const { from, password, gseAddress, l1RpcUrls, l1ChainId, output } = options;
173
+ // Load the keystore file
174
+ const keystore = loadKeystoreFile(from);
175
+ if (!gseAddress) {
176
+ throw new Error('GSE contract address is required');
177
+ }
178
+ log(`Calling GSE contract ${gseAddress} on chain ${l1ChainId}, using ${l1RpcUrls.join(', ')} to get staker outputs`);
179
+ if (!keystore.validators || keystore.validators.length === 0) {
180
+ log('No validators found in keystore');
181
+ return;
182
+ }
183
+ const allOutputs = [];
184
+ // L1 client for proof of possession
185
+ const chain = createEthereumChain(l1RpcUrls, l1ChainId);
186
+ const publicClient = createPublicClient({
187
+ chain: chain.chainInfo,
188
+ transport: fallback(l1RpcUrls.map((url)=>http(url)))
189
+ });
190
+ const gse = new GSEContract(publicClient, gseAddress);
191
+ const keystoreBaseName = basename(from, '.json');
192
+ const outputDir = output ? output : dirname(from);
193
+ for(let i = 0; i < keystore.validators.length; i++){
194
+ const validator = keystore.validators[i];
195
+ const outputs = await processAttesterAccounts(validator.attester, gse, password);
196
+ for(let j = 0; j < outputs.length; j++){
197
+ allOutputs.push(outputs[j]);
198
+ }
199
+ }
200
+ if (allOutputs.length === 0) {
201
+ log('No attesters with BLS keys found (skipping mnemonics and encrypted keystores without password)');
202
+ return;
203
+ }
204
+ // Write a single JSON file with all staker outputs
205
+ const stakerOutputPath = join(outputDir, `${keystoreBaseName}_staker_output.json`);
206
+ writeFileSync(stakerOutputPath, prettyPrintJSON(allOutputs), 'utf-8');
207
+ log(`Wrote staker output for ${allOutputs.length} validator(s) to ${stakerOutputPath}`);
208
+ }
@@ -0,0 +1,25 @@
1
+ import type { EthAddress } from '@aztec/foundation/eth-address';
2
+ export declare const defaultBlsPath = "m/12381/3600/0/0/0";
3
+ export declare function validateBlsPathOptions(options: {
4
+ count?: number;
5
+ publisherCount?: number;
6
+ accountIndex?: number;
7
+ addressIndex?: number;
8
+ blsPath?: string;
9
+ ikm?: string;
10
+ }): void;
11
+ export declare function validateStakerOutputOptions(options: {
12
+ stakerOutput?: boolean;
13
+ gseAddress?: EthAddress;
14
+ l1RpcUrls?: string[];
15
+ l1ChainId?: number;
16
+ }): void;
17
+ export declare function validateRemoteSignerOptions(options: {
18
+ remoteSigner?: string;
19
+ mnemonic?: string;
20
+ }): void;
21
+ export declare function validatePublisherOptions(options: {
22
+ publishers?: string[];
23
+ publisherCount?: number;
24
+ }): void;
25
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidXRpbHMuZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9jbWRzL3ZhbGlkYXRvcl9rZXlzL3V0aWxzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sS0FBSyxFQUFFLFVBQVUsRUFBRSxNQUFNLCtCQUErQixDQUFDO0FBR2hFLGVBQU8sTUFBTSxjQUFjLHVCQUF1QixDQUFDO0FBRW5ELHdCQUFnQixzQkFBc0IsQ0FBQyxPQUFPLEVBQUU7SUFDOUMsS0FBSyxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ2YsY0FBYyxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ3hCLFlBQVksQ0FBQyxFQUFFLE1BQU0sQ0FBQztJQUN0QixZQUFZLENBQUMsRUFBRSxNQUFNLENBQUM7SUFDdEIsT0FBTyxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQ2pCLEdBQUcsQ0FBQyxFQUFFLE1BQU0sQ0FBQztDQUNkLFFBV0E7QUFFRCx3QkFBZ0IsMkJBQTJCLENBQUMsT0FBTyxFQUFFO0lBQ25ELFlBQVksQ0FBQyxFQUFFLE9BQU8sQ0FBQztJQUN2QixVQUFVLENBQUMsRUFBRSxVQUFVLENBQUM7SUFDeEIsU0FBUyxDQUFDLEVBQUUsTUFBTSxFQUFFLENBQUM7SUFDckIsU0FBUyxDQUFDLEVBQUUsTUFBTSxDQUFDO0NBQ3BCLFFBZUE7QUFFRCx3QkFBZ0IsMkJBQTJCLENBQUMsT0FBTyxFQUFFO0lBQUUsWUFBWSxDQUFDLEVBQUUsTUFBTSxDQUFDO0lBQUMsUUFBUSxDQUFDLEVBQUUsTUFBTSxDQUFBO0NBQUUsUUFNaEc7QUFFRCx3QkFBZ0Isd0JBQXdCLENBQUMsT0FBTyxFQUFFO0lBQUUsVUFBVSxDQUFDLEVBQUUsTUFBTSxFQUFFLENBQUM7SUFBQyxjQUFjLENBQUMsRUFBRSxNQUFNLENBQUE7Q0FBRSxRQXdCbkcifQ==
@@ -0,0 +1 @@
1
+ {"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../../src/cmds/validator_keys/utils.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAGhE,eAAO,MAAM,cAAc,uBAAuB,CAAC;AAEnD,wBAAgB,sBAAsB,CAAC,OAAO,EAAE;IAC9C,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,GAAG,CAAC,EAAE,MAAM,CAAC;CACd,QAWA;AAED,wBAAgB,2BAA2B,CAAC,OAAO,EAAE;IACnD,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,UAAU,CAAC,EAAE,UAAU,CAAC;IACxB,SAAS,CAAC,EAAE,MAAM,EAAE,CAAC;IACrB,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB,QAeA;AAED,wBAAgB,2BAA2B,CAAC,OAAO,EAAE;IAAE,YAAY,CAAC,EAAE,MAAM,CAAC;IAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;CAAE,QAMhG;AAED,wBAAgB,wBAAwB,CAAC,OAAO,EAAE;IAAE,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;IAAC,cAAc,CAAC,EAAE,MAAM,CAAA;CAAE,QAwBnG"}